【24h】

Traffic to protocol reverse engineering

机译:进行协议逆向工程

获取原文

摘要

Network Protocol Reverse Engineering (NPRE) has played an increasing role in honeypot operations. It allows to automatically generate Statemodels and scripts being able to act as realistic counterpart for capturing unknown malware. This work proposes a novel approach in the field of NPRE. By passively listening to network traces, our system automatically derives the protocol state machines of the peers involved allowing the analyst to understand its intrinsic logic. We present a new methodology to extract the relevant fields from arbitrary binary protocols to construct a statemodel. We prove our methodology by deriving the statemachine of documented protocols ARP, DHCP and TCP. We then apply it to Kademlia, the results show the usefulness to support binary reverse engineering processes and detect a new undocumented feature.
机译:网络协议逆向工程(NPRE)在蜜罐操作中扮演着越来越重要的角色。它允许自动生成状态模型和脚本,以充当捕获未知恶意软件的现实对等物。这项工作提出了NPRE领域中的一种新方法。通过被动地侦听网络跟踪,我们的系统会自动派生所涉及对等方的协议状态机,从而使分析人员能够了解其内在逻辑。我们提出了一种从任意二进制协议中提取相关字段以构造状态模型的新方法。我们通过导出已记录协议ARP,DHCP和TCP的状态机来证明我们的方法。然后,我们将其应用于Kademlia,结果显示了支持二进制逆向工程过程和检测新的未记录功能的有用性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号